0% found this document useful (0 votes)
98 views25 pages

Introduction To Information Technology

IT Terminologies Computer Peripherals/Hardware Difference Between Northbridge and Southbridge Types of Software Types of Databases Types of Network Topology

Uploaded by

Samuel Pascua
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
98 views25 pages

Introduction To Information Technology

IT Terminologies Computer Peripherals/Hardware Difference Between Northbridge and Southbridge Types of Software Types of Databases Types of Network Topology

Uploaded by

Samuel Pascua
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd

PASCUA, Samuel G.

BSEE - V

Terminologies and Acronyms

Applications

Complete, self-contained programs that perform a specific function (ie.

spreadsheets, databases)

Bit

A computer's most basic unit of information

Boot

The process of loading or initializing an operating system on a computer; usually

occurs as soon as a computer is turned on

Browser

A program used to view World Wide Web pages, such as Netscape Navigator or

Internet Explorer

Bug

A part of a program that usually causes the computer to malfunction; often

remedied in patches or updates to the program

Byte

Small unit of data storage; 8 bits; usually holds one character

Database

A large structured set of data; a file that contains numerous records that contain

numerous fields
PASCUA, Samuel G.
BSEE - V

DHCP

The dynamic host configuration protocol allows computers to automatically

request and be assigned IP addresses and other network settings. For example,

when you connect your laptop or smartphone to your Wi-Fi network, your device

asks the router for an IP address using DHCP and the router assigns an IP

address. This simplifies things you dont have to set up static IP addresses

manually.

DNS

The domain name system is how computers convert human-readable domain

names and hostnames to numerical IP addresses. When you type

howtogeek.com into your web browsers address bar, your computer contacts its

DNS server and the DNS server replies with the numerical IP address of How-To

Geeks server, which is what your computer connects to.

Youre likely using your ISPs DNS servers by default, but you can use third-party

DNS servers if you prefer.

Domain Name

Domain names are the base part of website names. like howtogeek.com or

google.com. Note that domain names are just another type of hostname.

Download

Transferring data from another computer to your computer

Driver

Software program that controls a piece of hardware or a peripheral


PASCUA, Samuel G.
BSEE - V

Ethernet

Ethernet is the standard wired network technology in use almost everywhere

today. If your computer is connected to a network via a cable, its likely using an

Ethernet cable. That cable plugs into an Ethernet port on your computer.

File

Namable unit of data storage; an element of data storage; a single sequence of

bytes

Folder

A graphical representation used to organize a collection of computer files; as in

the concept of a filing cabinet (computer's hard drive) with files (folders)

Freeware

Software provided at no cost to the user

Gateway

A gateway is a device that routes traffic between networks. For example, at

home, your router is your gateway. It provides a gateway between your LAN

and WAN.

Gigabyte

1,073,741,824 bytes or 1,024 megabytes; generally abbreviated GB

GUI

Graphical user interface; uses pictures and words to represent ideas, choices,

functions, etc.
PASCUA, Samuel G.
BSEE - V

Internet

A network of computer networks encompassing the World Wide Web, FTP,

telnet, and many other protocols

IP number

Internet protocol; a computer's unique address or number on the Internet

IPv4 and IPv6

There are two types of IP address in common use. Older IPv4 (IP version 4)

addresses are the most common, followed by newer IPv6 (IP version 6)

addresses. IPv6 is necessary because we just dont have enough IPv4

addresses for all the people and devices in the world.

ISP

Internet service provider is the company that provides you with your Internet

connection.

Kilobyte

1,024 bytes; usually abbreviated KB

LAN

A local area network is a small network thats confined to a local area. For

example, your home network or an office network is a LAN.

MAC Address

Each network interface has a media access control address, or MAC address

also known as a physical address. This is a unique identifier designed to identify

different computers on a network. MAC addresses are usually assigned when a

manufacturer creates a network device.

For example, when you visit an airport and use 30 minutes of free Wi-Fi before

being kicked off and refused access to further Wi-FI without paying, the airports
PASCUA, Samuel G.
BSEE - V

Wi-Fi network has likely noted your devices MAC address and is using it to track

your PC and prevent you from taking advantage of more free time. MAC

addresses could also be used to assign static IP addresses to specific devices,

so theyd always get the same IP address when they connected to a router with

DHCP.

MAC addresses are actually more fluid in practice, as you can change your

network interfaces MAC address. (Yes, this means you can often gain access to

more free airport Wi-Fi by changing your devices MAC address.)

Megabyte

1,048,576 bytes or 1,024 kilobytes; enough storage to approximately equal a

600-page paperback book; generally abbreviated Mb

Memory

Any device that holds computer data

Menu

A list of operations available to the user of a program

Network

A collection of computers that are connected

Peripheral

Any of a number of hardware devices connected to a CPU

Router

A router is a device that passes traffic back and forth. You likely have a home

router. Its that routers job to pass outgoing traffic from your local devices to the

Internet, and to pass incoming traffic from the Internet to your devices.
PASCUA, Samuel G.
BSEE - V

Spreadsheet

A program arranged in rows and columns that manipulates numbers

Tool Bar

A graphical representation of program activities; a row of icons used to perform

tasks in a program

URL

Uniform resource locator; the address of a site on the World Wide Web; a

standard way of locating objects on the Internet

Virus

A deliberately harmful computer program designed to create annoying glitches or

destroy data

Window

A screen in a software program that permits the user to view several programs at

one time

Word Processor

A program that allows the user to create primarily text documents


PASCUA, Samuel G.
BSEE - V

Computer Hardware/Peripherals

Hardware - The physical parts of a computer

CPU

Central processing unit; the brain of the computer; controls the other elements of

the computer

Disk Drive

A peripheral device that reads and/or writes information on a disk

Hard Drive

A device (usually within the computer case) that reads and writes information,

including the operating system, program files, and data files

Keyboard

A peripheral used to input data by pressing keys

Modem

A peripheral device used to connect one computer to another over a phone line

Monitor

A device used to display information visually

Mouse

A peripheral device used to point to items on a monitor

NIC

Network interface card; a board inserted in a computer that provides a physical

connection to a network
PASCUA, Samuel G.
BSEE - V

Printer

A peripheral device that converts output from a computer into a printed image
PASCUA, Samuel G.
BSEE - V

Differences between Northbridge and Southbridge

Northbridge:

The Northbridge is one of the two chips in the core logic chipset on a PC

motherboard, the other being the Southbridge. In Intel chipset systems it is

named memory controller hub (MCH) or integrated memory controller (IMCH)

if equipped with an integrated VGA.

Separating the chipset into the Northbridge and Southbridge is common,

although there are rare instances where these two chips have been combined

onto one die when design complexity and fabrication processes permit it.

The Northbridge typically handles communications among the CPU, RAM, BIOS

ROM, and PCI Express (or AGP) video cards, and the Southbridge. Some north

bridges also contain integrated video controllers, also known as a Graphics and

Memory Controller Hub (GMCH) in Intel systems. Because different processors

and RAM require different signaling, a Northbridge will typically work with only

one or two classes of CPUs and generally only one type of RAM.

There are a few chipsets that support two types of RAM (generally these are

available when there is a shift to a new standard). For example, the Northbridge

from the Nvidia nForce2 chipset will only work with Socket A processors

combined with DDR SDRAM, the Intel i875 chipset will only work with systems

using Pentium 4 processors or Celeron processors that have a clock speed

greater than 1.3 GHz and utilize DDR SDRAM, and the Intel i915g chipset only

works with the Intel Pentium 4 and the Celeron, but it can use DDR or DDR2

memory.
PASCUA, Samuel G.
BSEE - V

Southbridge:

The Southbridge is one of the two chips in the core logic chipset on a PC

motherboard, the other being the Northbridge. The Southbridge typically

implements the "slower" capabilities of the motherboard in Northbridge

/Southbridge chipset computer architecture. In Intel chipset systems the

Southbridge is named Input/Output Controller Hub (ICH).

The Southbridge can usually be distinguished from the Northbridge by not being

directly connected to the CPU. Rather, the Northbridge ties the Southbridge to

the CPU. Through the use of controller integrated channel circuitry, the

Northbridge can directly link signals from the I/O units to the CPU for data control

and access.
PASCUA, Samuel G.
BSEE - V

Different Types of Computer Software

Software

- Instructions executed by a computer

Operating System

An operating system is a master program that a computer uses to execute both

user-level programs as well as the environment routines and drivers necessary

for the computer to run. Thus, on a standard personal computer an operating

system handles signals from input and output devices, manages memory usage

and controls peripherals. Therefore, the operating system is the most important

program a computer must run.

DOS, Microsoft Windows XP and Mac OS are some examples of personal

computer operating systems. Server-level computers use operating systems

such as UNIX and Microsoft Windows Server. LINUX and BSD are versatile

enough to be used either in a personal computer or as an operating system in a

server, depending on which components are installed.

With the size of most present operating systems a hard disk is required to store

the necessary files and programs. Should the operating system become

inoperable, many offer a "boot disk" option where a simpler version of the

operating system with only the necessary drivers and files is stored on removable

devices, usually a CD/DVD-ROM, USB flash drive or floppy disk. Booting the

computer with the boot disk allows the system to be accessed and repaired.

Portable devices, such as cellular phones and personal data assistants use

specialized, "embedded" operating systems that enable them to do many tasks once

only found in "platform" computers, such as email transactions, document operations

and database management.


PASCUA, Samuel G.
BSEE - V

Examples of Personal Computer/Server Operating Systems

UNIX

LINUX

PC/Microsoft DOS

A command-line operating system, MS/PC DOS helped usher in the microcomputer

age by providing an operating system that would run on the limited resources of the

8086/8088-based personal computer. Ms-dos

Microsoft Windows

Despite its numerous problems and irritations, Microsoft Windows is rightly credited

with enabling the non-technical user to operate a computer without having to learn

too many complicated commands and settings and has been instrumental to the

increased popularity of the personal computer.

MS Windows versions 1.0 and 2.x

MS Windows version 3.x

MS Windows 9x

MS Windows NT

MS Windows XP

MS Windows Vista

MS Windows 7

Examples of Embedded Operating Systems

Android

Palm OS
PASCUA, Samuel G.
BSEE - V

The Palm OS was preceded by the Japanese company PalmSource, and is the

dominant operating system for hand-helds. Over 30.1 million PalmOS units

(including licensees), according to Sept 2003 Palm Inc. financial reports; with over

22 million total USR/3Com/Palm or Palm Solutions Group branded units shipped

(over 4 million per year). Palm has many security concerns due to its mobility, such

as if lost or stolen palms may have data that can retrieved by others. Also if Palm

passwords are interconnected to your PC passwords, anyone has access to

personal files on your PC.

Symbian OS

Symbian is the operating software which is mostly used by the mobile phones.

Symbian is the biggest software producers for smart phones. There are the Symbian

codes used by different companies as well, Mika Raento has huge examples of

symbian codes. There are different companies that owns Symbian software;

examples are Sony Ericsson, Ericsson and Nokia has the highest percentage

(47.9%)

MS Windows CE

Though most versions of Microsoft Windows were developed for desktop

applications, a simpler version was created for hand-held devices called, "Windows

CE."
PASCUA, Samuel G.
BSEE - V

Firewall

A system that prevents unauthorized access to/from a private network. Can be

implemented in both hardware and software, or both. This form of security can be

used to prevent unauthorized Internet users from accessing private networks

connected to the Internet/inappropriate networks.

Applications

Applications are referred to as a type of computer software where the computer's

capabilities directly reflect that of the task

Custom

Custom software is under the category of application software. The word custom

means that the software is specially made for the individual and/or company

needs. This software is created by the programmers and software engineers.

Custom software can be very expensive since it is only developed on demand. A

very good example of a custom software is the application of it in space crafts,

ATM'S, and super market checkout machines. Custom software, which can also

be called bespoke software, is only created for individual companies to be used

for research and other things. It is also a risk for a company to develop custom

software since it is very expensive or demands huge sums of money to develop.

Commercial

Commercial Software, also known as Proprietary Software or Packaged

Software, is software that can be bought and sold. Commercial Software is

copyrighted, so you must pay for it in some respect. Examples of this are

Microsoft Excel or Adobe Photoshop.

Commercial software is generally bought in retails stores in a physical form.

However, in some cases you can download the program you desire over the

internet for a lesser fee. Commercial software programs use things such as

passwords and user registrations to make sure only paid customers are using the
PASCUA, Samuel G.
BSEE - V

program. Commercial software such as Norton AntiVirus uses thirty day free

trials to familiarize the user with the product before they purchase it.

Shareware

Shareware is basically "try before you buy" software. Unlike most software where

you have to buy the software before you can actually use it, the concept of

Shareware lets you try a program for a short period of time before you buy it.

This gives the consumer an opportunity to test out the software and see if it suits

his needs or not. This not only helps the consumer get a feel for the product but

is also beneficial to the company providing the Shareware Software to market

their product. Shareware has the ultimate money-back guarantee - if you don't

use the product, you don't pay for it!

Open Source

Software that has released the files it was written in, usually free, so you can

download and change the original code, therefore changing the program.

Viro has contributed 1,571 changes to the kernel, which sits at the core of the

Linux operating system, over the past three years, according to a new report

from the Linux Foundation. That's more than any other individual developer, the

report states. In contrast, Torvalds, the kernel's creator and steward, contributed

495 changes.

During the past three years, the top 10 individual developers have contributed

nearly 15 percent of the changes to the kernel, while the top 30 developers have

submitted 30 percent, the report states.

Utilities

Also known as service programs. Utilities perform a variety of functions like disk

defragmenting or data compression. When utilities become popular they are

usually incorporated into the operating system.


PASCUA, Samuel G.
BSEE - V

Driver

A computer driver is a program that controls a device. There are device drivers

for printers, displays, CD-ROM readers, diskette drives, and so on. For other

devices, you may need to install a new driver when you connect the device to

your computer. In DOS systems, drivers are files with a .SYS extension. In

Windows environments, drivers often have a .DRV extension.

A driver acts like a translator between the device and programs that use the

device. Each device has its own set of specialized commands that only its driver

knows. In contrast, most programs access devices by using generic commands.

The driver, therefore, accepts generic commands from a program and then

translates them into specialized commands for the device.

Virus

A virus is a program that can destroy and corrupt data on a computer. It can

come through a floppy disk, CD, or USB, but now usually comes through email.

Virus are programs that can copy themselves and create problems in one

computer without the user ever knowing or authorizing it. Virus can only be

spread when they are taken to an uninfected computer. Viruses are commonly

confused with computer worms and Trojan horses. A worm has the capabilities to

spread itself to other computers without needing to be transferred as part of a

host. Trojan horses are files that appear to be harmless until they are executed.

Antivirus software is a computer program that attempts to identify and eliminate

computer viruses. There are two different techniques to accomplish this,

examining(scanning) and identifying suspicious behavior


PASCUA, Samuel G.
BSEE - V

Different Types of Databases

Relational Databases

This is the most common of all the different types of databases. In this, the data

in a relational database is stored in various data tables. Each table has a key

field which is used to connect it to other tables. Hence all the tables are related to

each other through several key fields. These databases are extensively used in

various industries and will be the one you are most likely to come across when

working in IT.

Examples of relational databases are Oracle, Sybase and Microsoft SQL Server

and they are often key parts of the process of software development. Hence you

should ensure you include any work required on the database as part of your

project when creating a project plan and estimating project costs.

Operational Databases

In its day to day operation, an organisation generates a huge amount of data.

Think of things such as inventory management, purchases, transactions and

financials. All this data is collected in a database which is often known by several

names such as operational/ production database, subject-area database (SADB)

or transaction databases.

An operational database is usually hugely important to Organisations as they

include the customer database, personal database and inventory database ie the

details of how much of a product the company has as well as information on the

customers who buy them. The data stored in operational databases can be

changed and manipulated depending on what the company requires.

Database Warehouses

Organisations are required to keep all relevant data for several years. In the UK it

can be as long as 6 years. This data is also an important source of information


PASCUA, Samuel G.
BSEE - V

for analysing and comparing the current year data with that of the past years

which also makes it easier to determine key trends taking place. All this data

from previous years are stored in a database warehouse. Since the data stored

has gone through all kinds of screening, editing and integration it does not need

any further editing or alteration.

With this database ensure that the software requirements specification (SRS) is

formally approved as part of the project quality plan.

Distributed Databases

Many organisations have several office locations, manufacturing plants, regional

offices, branch offices and a head office at different geographic locations. Each

of these work groups may have their own database which together will form the

main database of the company. This is known as a distributed database.

End-User Databases

There is a variety of data available at the workstation of all the end users of any

organisation. Each workstation is like a small database in itself which includes

data in spreadsheets, presentations, word files, note pads and downloaded files.

All such small databases form a different type of database called the end-user

database.

External Database

There is a sea of information available outside world which is required by an

organisation. They are privately-owned data for which one can have conditional

and limited access for a fortune. This data is meant for commercial usage. All

such databases outside the organisation which are of use and limited access are

together called external database.


PASCUA, Samuel G.
BSEE - V

Hypermedia Database

Most websites have various interconnected multimedia pages which might

include text, video clips, audio clips, photographs and graphics. These all need to

be stored and called from somewhere when the webpage if created. All of them

together form the hypermedia database.

Navigational Database

Navigational database has all the items which are references from other objects.

In this, one has to navigate from one reference to other or one object to other. It

might be using modern systems like XPath. One of its applications is the air flight

management systems.

In-Memory Database

An in-memory database stores data in a computers main memory instead of

using a disk-based storage system. It is faster and more reliable than that in a

disk. They find their application in telecommunications network equipments.

Document-Oriented Database

A document oriented database is a different type of database which is used in

applications which are document oriented. The data is stored in the form of text

records instead of being stored in a data table as usually happens.

Real-Time Database

A real-time database handles data which constantly keep on changing. An

example of this is a stock market database where the value of shares changes

every minute and need to be updated in the real-time database. This type of

database is also used in medical and scientific analysis, banking, accounting,

process control, reservation systems etc. Essentially anything which requires

access to fast moving and constantly changing information.


PASCUA, Samuel G.
BSEE - V

Analytical Database

An analytical database is used to store information from different types of

databases such as selected operational databases and external databases.

Other names given to analytical databases are information databases,

management databases or multi-dimensional databases. The data stored in an

analytical database is used by the management for analysis purposes, hence the

name. The data in an analytical database cannot be changed or manipulated.


PASCUA, Samuel G.
BSEE - V

Types of Network Topology

Network Topology refers to layout of a network. How different nodes in a network

are connected to each other and how they communicate is determined by the

network's topology.Network Topology refers to layout of a network. How different

nodes in a network are connected to each other and how they communicate is

determined by the network's topology.

Mesh Topology

In a mesh network, devices are connected with many redundant interconnections

between network nodes. In a true mesh topology every node has a connection to

every other node in the network. There are two types of mesh topologies:

1. Full mesh topology: occurs when every node has a circuit connecting

it to every other node in a network. Full mesh is very expensive to

implement but yields the greatest amount of redundancy, so in the event

that one of those nodes fails, network traffic can be directed to any of the

other nodes. Full mesh is usually reserved for backbone networks.

2. Partial mesh topology: is less expensive to implement and yields less

redundancy than full mesh topology. With partial mesh, some nodes are

organized in a full mesh scheme but others are only connected to one or

two in the network. Partial mesh topology is commonly found in peripheral

networks connected to a full meshed backbone.


PASCUA, Samuel G.
BSEE - V

Star Topology

In a star network devices are connected to a central computer, called a hub.

Nodes communicate across the network by passing data through the hub.

Main Advantage: In a star network, one malfunctioning node doesn't affect the

rest of the network.

Main Disadvantage: If the central computer fails, the entire network becomes

unusable.

Bus Topology

In networking a bus is the central cable -- the main wire -- that connects all

devices on a local-area network (LAN). It is also called the backbone. This is

often used to describe the main network connections composing the Internet.

Bus networks are relatively inexpensive and easy to install for small networks.

Ethernet systems use a bus topology.

Main Advantage: It's easy to connect a computer or device and typically it

requires less cable than a star topology.

Main Disadvantage: The entire network shuts down if there is a break in the

main wire and it can be difficult to identify the problem if the network shuts down.
PASCUA, Samuel G.
BSEE - V

Ring Topology

A local-area network (LAN) whose topology is a ring. That is, all of the nodes are

connected in a closed loop. Messages travel around the ring, with each node

reading those messages addressed to it.

Main Advantage: One main advantage to a ring network is that it can span

larger distances than other types of networks, such as bus networks, because

each node regenerates messages as they pass through it.

Tree Topology

This is a "hybrid" topology that combines characteristics of linear bus and star

topologies. In a tree network, groups of star-configured networks are connected

to a linear bus backbone cable.

Main Advantage: A Tree topology is a good choice for large computer networks

as the tree topology "divides" the whole network into parts that are more easily

manageable.
PASCUA, Samuel G.
BSEE - V

Main Disadvantage: The entire network depends on a central hub and a failure

of the central hub can cripple the whole network.


PASCUA, Samuel G.
BSEE - V

References:

https://www.howtogeek.com/191139/22-common-network-jargon-terms-explained/

http://web.pdx.edu/~stipakb/download/PA550/BasicComputerTerms.htm

http://computer-help-tips.blogspot.com/2011/04/northbridge-vs-southbridge.html

https://en.wikiversity.org/wiki/Types_of_Computer_Software

http://www.my-project-management-expert.com/different-types-of-databases.html

http://www.my-project-management-expert.com/different-types-of-databases-2.html

http://www.webopedia.com/quick_ref/topologies.asp

You might also like